Learn Online with Cisco Live!

Total Page:16

File Type:pdf, Size:1020Kb

Learn Online with Cisco Live! SDN Controllers - A Use Case Driven Approach to the Options Paul Cernick and Chad Peterson Contributors and Acknowledgements • Lukas Krattiger • Leo Boulton • David Jansen • Victor Moreno • Vaughn Suazo • Kevin Corbin • Yves Louis • Dave Malik • Babi Seal • Brenden Buresh • Lilian Quan • James Christopher • Jason Gmitter • Mike Herbert • Jim Pisano • Chad Hintz • Juan Lage • Matt Smorto • Errol Roberts • Jason Pfiefer • Giles Heron • Cesar Obediente • Lilian Quan • Brendan Kelly Agenda • Why SDN Controllers • Foundational Technical Requirements • Use Cases and Cisco’s Solutions • Conclusion and Questions Paul Cernick Chad Peterson • Technical Solutions Architect • Data Centre Consulting Systems Engineer • Global Service Provider Architecture • US Commercial - Central • CCIE 5383 – R&S + SP • CCIE 23213 – R&S + DC ? Why Did we Create this Session? Warning! Vast amount of technologies Not everything will be relevant to you…today Evolution of Network Configuration 1990s Today hq>enable hq# config terminal hq(config)# interface fastethernet 1/1 hq(config-if)# ip address NEXUS>enable NEXUS(config)# feature eigrp 1.1.1.1 255.255.255.0 NEXUS# config terminal NEXUS(config)# router eigrp Test1 hq(config-if)# no shutdown NEXUS(config)# interface NEXUS(config)# interface hq(config-if)# exit ethernet 1/1 ethernet 1/1 hq(config)# router eigrp NEXUS(config-if)# no switchport NEXUS(config-if)# ip router hq(config-router)# network 1.1.1.0 NEXUS(config-if)# ip address eigrp Test1 hq(config-router)# exit 1.1.1.1 255.255.255.0 NEXUS(config-if)# no shutdown hq(config)# exit NEXUS(config-if)# no shutdown NEXUS(config-if)# end hq# copy run start NEXUS(config-if)# exit NEXUS# copy run start Need More than Centralised Management Relationships Need More than Centralised Management SDN Use Cases Network Function Network Traffic Virtualization Abstraction Engineering SDN Use Cases Virtual Topology System Application Centric Open SDN Controller VTS Infrastructure OSC ACI Foundational Technologies VXLAN DC Fabric Journey Spanning Tree Protocol Virtual Layer 2 Port-Channel FabricPath DC Fabric Journey Virtual Extensible LAN Spanning Tree Protocol Layer 3 Virtual Port-Channel VXLAN 44517 FabricPath VXLAN 32145 VTEP VTEP VTEP VTEP VTEP VXLAN Virtual Virtual Switch Local LAN Switch Segment Virtual Switch VXLAN Tunnel Encapsulation Tunnel VXLAN 48 Dst. MAC Addr. 48 Src. MAC Addr. Mac HeaderMac 16 VLAN Type Outer 0x8100 Bytes or 14 10 16 VLAN ID Tag 16 Ether Type 0x0800 IP Header Outer 72 IP Header Misc Data Protocol 8 0x11 HeaderUDP VTEP IPs VTEP 16 Header Checksum Bytes 20 32 Outer Src. IP 32 Outer Header Dst. IP VXLAN 16 UDP Src. Port Original L2 FrameL2 Original FCS 16 UDP Dst Port 8 Bytes 8 16 UDP Length 16 Checksum 0x0000 VXLAN 8 VNID 16 million RRRR1RRR FCS 24 Reserved 8 Bytes 8 24 VNID 8 Reserved VXLAN Problems Layer 3 No Peer-Auth VXLAN 44517 Flood & Learn VXLAN 32145 VTEP VTEP VTEP VTEP VTEP VTEP Virtual Virtual Switch Local LAN Switch Segment Virtual Switch DC Fabric Journey Spanning Tree Protocol RR RR Virtual Layer 3 Port-Channel VXLAN 44517 FabricPath VXLAN 32145 VXLAN VXLAN with BGP EVPN SDN Journey Controller OpenFlow allows direct access to the forwarding plane of network switched devices. SDN Journey NSO Layer 3 VXLAN 44517 VXLAN 32145 VTEP VTEP VTEP VTEP VTEP Virtual Virtual Switch Switch API Controller APIs Application Programming Interface API Why We Care Collect list of used VLANS RESTful API’s Well Understood HTTP or HTTPS GET, PUT, POST, and DELETE Easy to Develop Against Client Server Versioned Response in HTML, JSON / XML API – Collect Information Collect List of Used VLANs POST: http://10.10.10.10/ins/ { "ins_api": { “version": “1.0”, “type": “cli_show”, “chunk": “0”, “sid": “1”, “input": “show vlan”, “output_format": “json”, } { List VLANS API – Collect Information Collect List of Used VLANs { "ins_api": { … 1 - default "body": { 101- n1k-l3 "TABLE_vlanbrief": { "ROW_vlanbrief": [ 123- VLAN0123 { 300- 1k-vtep "vlanshowbr-vlanid": "16777216", 999- VLAN0999 "vlanshowbr-vlanid-utf": "1", "vlanshowbr-vlanname": "default", … }, { "vlanshowbr-vlanid": "1694498816", "vlanshowbr-vlanid-utf": "101", List VLANS "vlanshowbr-vlanname": "n1k-l3", …} SDN Resets Business Opportunities New architecture with separate control and data planes Security, Load Balancing, Applications and Other Services Open programmable networks APIs and APIs SDN Platform Open Protocols New business models and revenue opportunities Efficiency in both capital and operational expenses Physical Network Physical Network VTS Use Case – Network Function Virtualisation High Level Virtual Topology System (VTS) Use Case Internet vFW CPE CPE vWAAS Customer SP Customer Metro and Access Metro and Access Prem Core Prem NFV Use Case Admin Tools Customer Portal OSS/BSS REST API Orchestration & Controllers Layer NSO VTS vCenter Plug-in VTS OpenStack Virtual Overlay Networking Layer BGP-EVPN MPLS VPN Network VXLAN VPN PE & VXLAN Gateway Nexus 9300 (ToR) Nexus 9300 (ToR) VLANs VLANs VLANs VLANs Virtual Infrastructure, VNF & PNF Layer PNF1 OVS dVS PNF2 VNF1 VNF2 VNF1 VNF2 Cisco Virtual Topology System (VTS) Overlay Provisioning and Management System Cisco Network Services Orchestrator (Tail-f) VMware vCenter GUI Flexible Overlays REST API Automated Physical and Virtual Overlays Seamless Integration with Orchestrators Bare-metal and Virtualized Workloads Automated Overlay Provisioning Service Chaining Automated DCI/WAN Integration Cisco Virtual Scalable VXLAN Mgmt. Open and Programmable Topology System REST-Based Northbound APIs MP-BGP EVPN Control Plane Multi-protocol Support Virtual Tenant Networks Multi-hypervisor Support High Performance Virtual Forwarding YANG CLI NX-API BGP-EVPN Nexus Portfolio Nexus 2k – 9k VTS Architecture Cisco Network Services Orchestrator (Tail-f) VMware vCenter GUI Unified Information Model (REST API) Virtual Topology System Policy Plane Policy Service and Infrastructure Policy Inventory Database Resource Management Control Plane Device Management IOS XRv YANG CLI NX-API BGP-EVPN Virtual Compute Environment OVS VTF DVS Cisco Nexus 2000, 3000, Cisco Nexus Cisco ASR 5000, and 7000 Series 9000 Series 9000 Series 3rd Party VM Cisco NSO VTS Architecture Manager vCenter GUI REST API Virtual Topology System BGP EVPN RR RR (VTS) Spine BGP RR - Border MP WAN / Internet Leaf 3rd Party Cloud V V V V V …. V OVS / dVS VTF RESTCONF/YANG DCI IP / MPLS WAN Physical Virtual Integrated Virtual Service Provider Oriented Architecture 3rd Party VM Cisco NSO VTS Architecture Manager vCenter GUI REST API Virtual Topology System RR RR (VTS) Spine RR Border WAN / Internet VXLAN Leaf 3rd Party Cloud V V V V V …. V OVS / dVS VTF DCI IP / MPLS WAN Physical Virtual Integrated Virtual Service Provider Oriented Architecture 3rd Party VM Overlay Provisioning Cisco NSO Manager Use Case vCenter GUI REST API Virtual Topology System (VTS) VXLAN Overlay • Layer-2 / Layer-3 VXLAN Border Configuration using MP-BGP EVPN control-plane Leaf V V V V V V • Allocate and Manage …. resources • Support for Physical and OVS / dVS Virtual End-Hosts • End-to-End Automation Physical • Openstack and vCenter integration Virtual VTS Architecture Virtual Topology System DCI Policy Plane Policy Service and Infrastructure Policy Inventory Database Border Leaf VTEP Resource Management Control Plane Device Management IOS XRv Spine Spine REST NX-API, API Cisco VTS CLI, YANG ToR VTEP ToR VTEP ToR VTEP VMware vCenter Hypervisor Hypervisor Hypervisor VM VM VM VM x86 Server x86 Server x86 Server VTS Architecture DCI Border Leaf VTEP Spine Spine REST NX-API, API Cisco VTS CLI, YANG ToR VTEP ToR VTEP ToR VTEP VMware vCenter Hypervisor Hypervisor Hypervisor VM VM VM VM x86 Server x86 Server x86 Server VTS – OpenStack Workflow vlan 1,1700-711,2000 vlan 1706 vn-segment 46006 6 VTS provisions VTEP, evpn VLAN for each VTEP evi 46006 vni and EVPN on ToR/VTF bgp rd auto 8 Create router and attach route-target import auto interfaces to tenant networks route-target export auto interface nve1 no shutdown 1 source-interface loopback0 Create Tenant 2 Tenant and Tenant Networks Spine Spine member vni 46006 Networks Created host-reachability protocol bgp mcast-group 224.1.1.1 REST NX-API, API Cisco VTS CLI, YANG 3 VNID assigned for each network ToR VTEP ToR VTEP ToR 7 Neutron agent modified to request VLAN VLAN VLAN VLAN VTEP 4 Attach VM to information Network from VTS VMware vCenter Hypervisor Hypervisor Hypervisor VLAN before VM VM VM VM programming 5 VM Host info captured by VTS x86 Server x86 Server x86 Server vSwitch and mapped to the right ToR & ToR port using topology database ACI Use Case – WordPress as a Service What is WordPress? • Open-source content management system • Originally a blogging platform, now a wider scope • 23% of the top 10million websites are powered by WordPress WPaaS Components and Requirements • 3 Types of servers – both BM and VM • Internal management L3 network • User L3 network • SSH access on all servers • All communication should be as restrictive as possible – only allow what must be allowed Traditional Implementation vlaninterfaceip access100 - listvlan db400100-provide namedescriptionpermit db tcp 192.168.200.0 InternalDatabase MgmtL3 0.0.0.255interface vlan192.168.100.0200hsrp 400100 0.0.0.255 3306 namepermit phpMyAdmin versiontcp 192.168.250.0 2 0.0.0.255 vlan192.168.100.0300 ip 0.0.0.255192.168.40.1192.168.100.1 3306 nameippermitaddress wp tcp 192.168.40.0192.168.40.1/24192.168.100.2/24 0.0.0.255 192.168.100.0 vlaninterface0.0.0.255400ip access 22vlan -500group db-provide out namedescription internal
Recommended publications
  • Cisco Nexus 1000V Switch for KVM Data Sheet
    Data Sheet Cisco Nexus 1000V Switch for KVM Product Overview Bring enterprise-class networking features to OpenStack cloud operating system environments. The Cisco Nexus ® 1000V Switch for the Ubuntu Kernel-based Virtual Machine (KVM) reduces the operating complexity associated with virtual machine networking. Together with the OpenStack cloud operating system, this switch helps you gain control of large pools of computing, storage, and networking resources. The Cisco Nexus 1000V Switch provides a comprehensive and extensible architectural platform for virtual machine and cloud networking. This switch is designed to accelerate your server virtualization and multitenant cloud deployments in a secure and operationally transparent manner. Operating as a distributed switching platform, the Cisco Nexus 1000V enhances the visibility and manageability of your virtual and cloud networking infrastructure. It supports multiple hypervisors and many networking services and is tightly integrated with multiple cloud management systems. The Cisco Nexus 1000V Switch for KVM offers enterprise-class networking features to OpenStack cloud operating system environments, including: ● Advanced switching features such as access control lists (ACLs) and port-based access control lists (PACLS). ● Support for highly scalable, multitenant virtual networking through Virtual Extensible LAN (VXLAN). ● Manageability features such as Simple Network Management Protocol (SNMP), NETCONF, syslog, and advanced troubleshooting command-line interface (CLI) features. ● Strong north-bound management interfaces including OpenStack Neutron plug-in support and REST APIs. Benefits The Cisco Nexus 1000V Switch reduces the operational complexity associated with virtual machine networking and enables you to accomplish the following: ● Easily deploy your Infrastructure-as-a-service (IaaS) networks ◦ As the industry’s leading networking platform, the Cisco Nexus 1000V delivers performance, scalability, and stability with familiar manageability and control.
    [Show full text]
  • CCNA-Cloud -CLDFND-210-451-Official-Cert-Guide.Pdf
    ptg17120290 CCNA Cloud CLDFND 210-451 Official Cert Guide ptg17120290 GUSTAVO A. A. SANTANA, CCIE No. 8806 Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii CCNA Cloud CLDFND 210-451 Official Cert Guide CCNA Cloud CLDFND 210-451 Official Cert Guide Gustavo A. A. Santana Copyright© 2016 Pearson Education, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing April 2016 Library of Congress Control Number: 2015957536 ISBN-13: 978-1-58714-700-5 ISBN-10: 1-58714-7009 Warning and Disclaimer ptg17120290 This book is designed to provide information about the CCNA Cloud CLDFND 210-451 exam. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
    [Show full text]
  • Solving the Virtualization Conundrum
    White Paper Solving the Virtualization Conundrum Collapsing hierarchical, multi-tiered networks of the past into more compact, resilient, feature rich, two-tiered, leaf- spine or SplineTM networks have clear advantages in the data center. The benefits of more scalable and more stable layer 3 networks far outweigh the challenges this architecture creates. Layer 2 networking fabrics of the past lacked stability and scale. This legacy architecture limited workload size, mobility, and confined virtual workloads to a smaller set of physical servers. As virtualization scaled in the data center, the true limitations of these fabrics quickly surfaced. The economics of workload convergence drives compute density and network scale. Similarly, to meet dynamic needs of business stakeholders, growing data centers must deliver better mobility and its administration must be automated. In essence, virtualized networks must scale, be stable and be programmatically administered! What the Internet has taught us is that TCP/IP architectures are reliable, fault tolerant, and built to last. Why create yet another fabric when we can leverage open standards and all the benefits that layer 3 networks provide. With this settled, we can work to develop an overlay technology to span layer two networks over a stable IP infrastructure. This is how Virtual eXtensible LAN (VXLAN) was born. arista.com White Paper At Arista we work to bring VXLAN to the mainstream by co-authoring the standard with industry virtualization leaders. We’re also innovating programmatic services and APIs that automate virtualized workflow management, monitoring, visualization and troubleshooting. VXLAN is designed from the ground up to leverage layer 3 IP underlays and the scale and stability it provides.
    [Show full text]
  • Understanding Linux Internetworking
    White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Introduction Layer 2 vs. Layer 3 Internetworking................ 2 The Internet: the largest internetwork ever created. In fact, the Layer 2 Internetworking on term Internet (with a capital I) is just a shortened version of the Linux Systems ............................................... 3 term internetwork, which means multiple networks connected Bridging ......................................................... 3 together. Most companies create some form of internetwork when they connect their local-area network (LAN) to a wide area Spanning Tree ............................................... 4 network (WAN). For IP packets to be delivered from one Layer 3 Internetworking View on network to another network, IP routing is used — typically in Linux Systems ............................................... 5 conjunction with dynamic routing protocols such as OSPF or BGP. You c an e as i l y use Linux as an internetworking device and Neighbor Table .............................................. 5 connect hosts together on local networks and connect local IP Routing ..................................................... 6 networks together and to the Internet. Virtual LANs (VLANs) ..................................... 7 Here’s what you’ll learn in this paper: Overlay Networks with VXLAN ....................... 9 • The differences between layer 2 and layer 3 internetworking In Summary ................................................. 10 • How to configure IP routing and bridging in Linux Appendix A: The Basics of TCP/IP Addresses ....................................... 11 • How to configure advanced Linux internetworking, such as VLANs, VXLAN, and network packet filtering Appendix B: The OSI Model......................... 12 To create an internetwork, you need to understand layer 2 and layer 3 internetworking, MAC addresses, bridging, routing, ACLs, VLANs, and VXLAN. We’ve got a lot to cover, so let’s get started! Understanding Linux Internetworking 1 Layer 2 vs.
    [Show full text]
  • Infrastructure : Netapp Solutions
    Infrastructure NetApp Solutions NetApp October 06, 2021 This PDF was generated from https://docs.netapp.com/us-en/netapp-solutions/infra/rhv- architecture_overview.html on October 06, 2021. Always check docs.netapp.com for the latest. Table of Contents Infrastructure . 1 NVA-1148: NetApp HCI with Red Hat Virtualization. 1 TR-4857: NetApp HCI with Cisco ACI . 84 Workload Performance. 121 Infrastructure NVA-1148: NetApp HCI with Red Hat Virtualization Alan Cowles, Nikhil M Kulkarni, NetApp NetApp HCI with Red Hat Virtualization is a verified, best-practice architecture for the deployment of an on- premises virtual datacenter environment in a reliable and dependable manner. This architecture reference document serves as both a design guide and a deployment validation of the Red Hat Virtualization solution on NetApp HCI. The architecture described in this document has been validated by subject matter experts at NetApp and Red Hat to provide a best-practice implementation for an enterprise virtual datacenter deployment using Red Hat Virtualization on NetApp HCI within your own enterprise datacenter environment. Use Cases The NetApp HCI for Red Hat OpenShift on Red Hat Virtualization solution is architected to deliver exceptional value for customers with the following use cases: 1. Infrastructure to scale on demand with NetApp HCI 2. Enterprise virtualized workloads in Red Hat Virtualization Value Proposition and Differentiation of NetApp HCI with Red Hat Virtualization NetApp HCI provides the following advantages with this virtual infrastructure solution: • A disaggregated architecture that allows for independent scaling of compute and storage. • The elimination of virtualization licensing costs and a performance tax on independent NetApp HCI storage nodes.
    [Show full text]
  • Increase Nfvi Performance and Flexibility
    SOLUTION BRIEF Telecommunications Server Performance Increase NFVi Performance and Flexibility Offload processing from software to hardware to create efficiency with HCL’s 50G Open vSwitch acceleration solution on the Intel® FPGA Programmable Acceleration Card (PAC) N3000. Eliminating the Performance Bottleneck In order to survive in a wildly competitive and ever-evolving industry, communications service providers (CoSPs) need to achieve the best performance possible, overcoming the bottlenecks that slow down their servers. With consistently growing numbers of subscribers, numbers of competitors, and advances in technology, the need for a CoSP to differentiate itself grows concurrently. The need for power efficiency is ever-present, as is the pressure to manage total cost of ownership (TCO) with cost-effective solutions. Intel and HCL had these challenges in mind when they collaborated on a joint solution that features Intel hardware and HCL software. Using the Intel FPGA Programmable Acceleration Card (Intel FPGA PAC) N3000, HCL has created a solution that can dramatically increase performance and preserve flexibility for network functions virtualization infrastructure (NFVi) routing and switching. Open vSwitch (OvS) is a production-quality, multilayer virtual switch that can also implement a software-defined networking (SDN)-based What Is the Intel FPGA approach that is crucial to creating a closed-loop, fully automated solution in NFVi. PAC N3000? With aggressive software optimization to offload NFVi forwarding functionalities The Intel FPGA Programmable to the Intel FPGA PAC N3000, Intel and HCL have created a system that can provide Acceleration Card (Intel FPGA the Intel FPGA–based solution, supported by selected NFVi suppliers. PAC) N3000 is a PAC that has OvS can either forward packets through a kernel-based datapath or by using the the right memory mixture for Linux Data Plane Development Kit (DPDK).
    [Show full text]
  • Linux Networking 101
    The Gorilla ® Guide to… Linux Networking 101 Inside this Guide: • Discover how Linux continues its march toward world domination • Learn basic Linux administration tips • See how easy it can be to build your entire network on a Linux foundation • Find out how Cumulus Linux is your ticket to networking freedom David M. Davis ActualTech Media Helping You Navigate The Technology Jungle! In Partnership With www.actualtechmedia.com The Gorilla Guide To… Linux Networking 101 Author David M. Davis, ActualTech Media Editors Hilary Kirchner, Dream Write Creative, LLC Christina Guthrie, Guthrie Writing & Editorial, LLC Madison Emery, Cumulus Networks Layout and Design Scott D. Lowe, ActualTech Media Copyright © 2017 by ActualTech Media. All rights reserved. No portion of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations. The information provided within this eBook is for general informational purposes only. While we try to keep the information up- to-date and correct, there are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained in this book for any purpose. Any use of this information is at your own risk. ActualTech Media Okatie Village Ste 103-157 Bluffton, SC 29909 www.actualtechmedia.com Entering the Jungle Introduction: Six Reasons You Need to Learn Linux ....................................................... 7 1. Linux is the future ........................................................................ 9 2. Linux is on everything .................................................................. 9 3. Linux is adaptable ....................................................................... 10 4. Linux has a strong community and ecosystem ........................... 10 5.
    [Show full text]
  • Network Service in Openstack Cloud
    Network Service in OpenStack Cloud Yaohui Jin email: [email protected] Sina Weibo: @bright_jin (The slides will be shared in Sina Weipan & Slideshare ) Network & Information Center © jinyh@sjtu Acknowledgement Team: Dr. Xuan Luo, Pengfei Zhang, Xiaosheng Zuo, Zhixing Xu, Xinyu Xu, Jianwen Wei, Baoqing Huang, etc. Prof. Hongfang Yu and team with UESTC Prof. Jianping Wang with CityU HK Engineers, discussion and slides from Intel, SINA, IBM, Cisco, Dell, VMware/EMC, H3C, Huawei, IXIA, … OpenStack Community China OpenStack User Group (COSUG) China OpenStack Cloud League (COSCL) Technical blogs such as blog.ioshints.info, ipspace.net, … © jinyh@sjtu 2 About me 上海交通大学 教授,以前做光通信的,现在改行 做云计算了。。。 上海交通大学 网络信息中心 副主任,其实就是 个苦逼的挨踢网管啊。。。 研究兴趣: 数据中心网络,海量流式数据分析, 云计算架构 © jinyh@sjtu 3 OpenStack in Academia for Research & Operation USC, Information Science Institute Purdue University University of Melbourne San Diego Supercomputer Center Brookhaven National Lab., DOE Argonne National Lab., DOE European Organization for Nuclear Research (CERN) Shanghai Jiao Tong University University of Science & Technology of China University of Electrical Science & Technology of China …… © jinyh@sjtu 4 Agenda Introduction SDN and OpenFlow Network Virtualization Network Virtualization in OpenStack Our Work © jinyh@sjtu 5 The Service Trend "Decoupling infrastructure management from service management can lead to innovation, new business models, and a reduction in the complexity of running services. It is happening in the world of computing, and is poised to happen in networking.“ Jennifer Rexford Professor, Princeton University Last month, VMware paid $1.2B to acquire Nicira for software defined networking (SDN). © jinyh@sjtu 6 Why is Nicira worth $1.2 billion? © jinyh@sjtu 7 SDN and OpenFlow © jinyh@sjtu Software Defined Network (SDN) A network architecture in which the network control plane (OS) is decoupled from the physical topology using open protocols such as OpenFlow.
    [Show full text]
  • A Performance Study of VM Live Migration Over the WAN
    Master Thesis Electrical Engineering April 2015 A Performance Study of VM Live Migration over the WAN TAHA MOHAMMAD CHANDRA SEKHAR EATI Department of Communication Systems Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering on Telecommunication Systems. The thesis is equivalent to 40 weeks of full time studies. Contact Information: Author(s): Taha Mohammad, Chandra Sekhar Eati. E-mail: [email protected], [email protected]. University advisor(s): Dr. Dragos Ilie, Department of Communication Systems. University Examiner(s): Prof. Kurt Tutschku, Department of Communication Systems. School of Computing Blekinge Institute of Technology Internet : www.bth.se SE-371 79 Karlskrona Phone : +46 455 38 50 00 Sweden Fax : +46 455 38 50 57 Abstract Virtualization is the key technology that has provided the Cloud computing platforms a new way for small and large enterprises to host their applications by renting the available resources. Live VM migration allows a Virtual Machine to be transferred form one host to another while the Virtual Machine is active and running. The main challenge in Live migration over WAN is maintaining the network connectivity during and after the migration. We have carried out live VM migration over the WAN migrating different sizes of VM memory states and presented our solutions based on Open vSwitch/VXLAN and Cisco GRE approaches. VXLAN provides the mobility support needed to maintain the network connectivity between the client and the Virtual machine.
    [Show full text]
  • Learn About VXLAN in Virtualized Data Center Networks
    Learn About VXLAN in Virtualized Data Center Networks Data centers have rapidly increased their server virtualization over the past decade, resulting in dramatic increases in agility. This, in turn, has created a demand for data center networks that are equally flexible and agile. Virtualization of the network is the next obvious step – decoupling the virtual network from the physical network makes it easier to manage, automate, and orchestrate. One common method being used today to virtualize data center networks is the use of overlay networks. An overlay network sits on top of the physical network, enabling Network overlays are the use of a virtual network of switches, routers, firewalls, load balancers, and so on. created by encapsulating This decoupling of the virtual from the physical enables fast programmatic provision- traffic and tunneling it ing of the network for any application. You no longer have to orchestrate changes over the physical network. Although relatively new to across a set of physical devices. data center networks, Creating a virtual overlay network also benefits the physical, or underlay, network, overlay networks have been used in campus which can now be a simple IP network that is concerned solely with delivering packets networks for years to carry to destinations. An overlay network adds simplicity, resiliency, and scale to the wireless LAN traffic over physical network, another reason overlay networks are gaining popularity. the wired network. Figure 1 illustrates an overlay network. From the perspectives of virtual machine 1 and virtual machine 2 (VM1 and VM2), traffic between them is taking the route shown by the dotted line, going through traditional networking devices such as switches, routers, and firewalls, which are instantiated in the hosts.
    [Show full text]
  • Contrail for the Enterprise | White Paper
    White Paper Contrail for the Enterprise Bringing Networks into the Cloud Era 1 Contrail for the Enterprise White Paper Table of Contents Executive Summary ........................................................................................................................................................................................................ 3 Introduction ........................................................................................................................................................................................................................ 3 Limitations of Today’s Network for Cloud Architectures .................................................................................................................................. 3 Scalability of the Network Edge ......................................................................................................................................................................... 3 Lack of Programmatic APIs ..................................................................................................................................................................................... 4 Inability to Orchestrate Multi-Cloud/Hybrid Cloud Environments ........................................................................................................4 Service Insertion Challenges ................................................................................................................................................................................4
    [Show full text]
  • Vmware Validated Design Reference Architecture Guide
    VMware Validated Design™ Reference Architecture Guide VMware Validated Design for Software- Defined Data Center 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-002167-00 VMware Validated Design Reference Architecture Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] © 2016 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Avenue Palo Alto, CA 94304 www.vmware.com © 2016 VMware, Inc. All rights reserved. Page 2 of 208 VMware Validated Design Reference Architecture Guide Contents 1 Purpose and Intended Audience .................................................... 12 2 Architecture Overview .................................................................... 13 2.1 Physical Infrastructure Architecture ............................................................................
    [Show full text]